![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.870769 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for rsyslog RHSA-2012:0796-04 |
Resumen: | The remote host is missing an update for the 'rsyslog'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'rsyslog' package(s) announced via the referenced advisory. Vulnerability Insight: The rsyslog packages provide an enhanced, multi-threaded syslog daemon. A numeric truncation error, leading to a heap-based buffer overflow, was found in the way the rsyslog imfile module processed text files containing long lines. An attacker could use this flaw to crash the rsyslogd daemon or, possibly, execute arbitrary code with the privileges of rsyslogd, if they are able to cause a long line to be written to a log file that rsyslogd monitors with imfile. The imfile module is not enabled by default. (CVE-2011-4623) Bug fixes: * Several variables were incorrectly deinitialized with Transport Layer Security (TLS) transport and keys in PKCS#8 format. The rsyslogd daemon aborted with a segmentation fault when keys in this format were provided. Now, the variables are correctly deinitialized. (BZ#727380) * Previously, the imgssapi plug-in initialization was incomplete. As a result, the rsyslogd daemon aborted when configured to provide a GSSAPI listener. Now, the plug-in is correctly initialized. (BZ#756664) * The fully qualified domain name (FQDN) for the localhost used in messages was the first alias found. This did not always produce the expected result on multihomed hosts. With this update, the algorithm uses the alias that corresponds to the hostname. (BZ#767527) * The gtls module leaked a file descriptor every time it was loaded due to an error in the GnuTLS library. No new files or network connections could be opened when the limit for the file descriptor count was reached. This update modifies the gtls module so that it is not unloaded during the process lifetime. (BZ#803550) * rsyslog could not override the hostname to set an alternative hostname for locally generated messages. Now, the local hostname can be overridden. (BZ#805424) * The rsyslogd init script did not pass the lock file path to the 'status' action. As a result, the lock file was ignored and a wrong exit code was returned. This update modifies the init script to pass the lock file to the 'status' action. Now, the correct exit code is returned. (BZ#807608) * Data could be incorrectly deinitialized when rsyslogd was supplied with malformed spool files. The rsyslogd daemon could be aborted with a segmentation fault. This update modifies the underlying code to correctly deinitialize the data. (BZ#813079) * Previously, deinitialization of non-existent data could, in certain error cases, occur. As a result, r ... Description truncated, please see the referenced URL(s) for more information. Affected Software/OS: rsyslog on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 2.1 CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-4623 1026556 http://www.securitytracker.com/id?1026556 45848 http://secunia.com/advisories/45848 47698 http://secunia.com/advisories/47698 51171 http://www.securityfocus.com/bid/51171 USN-1338-1 http://www.ubuntu.com/usn/USN-1338-1 [oss-security] 20111222 Re: CVE Request -- rsyslog -- DoS due integer signedness error while extending rsyslog counted string buffer http://www.openwall.com/lists/oss-security/2011/12/22/2 http://bugzilla.adiscon.com/show_bug.cgi?id=221 http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101 http://rsyslog.com/changelog-for-4-6-6-v4-stable/ http://rsyslog.com/changelog-for-5-7-4-v5-beta/ http://rsyslog.com/changelog-for-6-1-4-devel/ https://bugzilla.redhat.com/show_bug.cgi?id=769822 |
Copyright | Copyright (C) 2012 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |